Biometrics in Network Security

Authors

  • Fathima N Dept. of Computer Applications, DSCASC, BANGALORE, INDIA
  • Pallavi BN Dept. of Computer Applications, DSCASC, BANGALORE, INDIA
  • Kavitha K Dept. of Computer Applications, DSCASC, BANGALORE, INDIA

Keywords:

Authentication, cryptography, networking

Abstract

— Security has been a major interest for authentication over networking. In this modern society, mobile devices have a pertained importance with hundreds and millions users. With the help of pins, passwords there are weak authentication mechanisms which allow attackers to access the stored data. By implementing various methods for key exchange cryptographic can solve the problem of security. Identity verification is a developing and mesmerizes much attention. Biometric recognition mainly relates to the automatic recognition of individuals based on their behavioral characteristics. Almost appropriate is based on vein pattern is an approach that uses the vast network of blood vessels that lie underneath a skin. Vein pattern are unique and also difficult to duplicate even twin has an unlike and unique vein structure. Biometric security devices measure unique characteristics of a person, such as voice pattern, the iris or retina pattern of the eye and finger print. In biometrics, it is very difficult for someone to break into a system. Biometric security is a mechanism which is used to prove and provide access to a facility or system based on the automatic and direct verification of a single person’s physical behavior.

References

[1] Kirat Pal Singh Senior Project Fellow Council of Scientific and Industrial Research (CSIR) – Central Scientific Instruments Organization (CSIO) CSIR-CSIO, Ministry of Science & Technology, Chandigarh-160030

[2] Mohammed Nasir Uddin1, Selina Sharmin2, Abu Hasnat Shohel Ahmed3 and Emrul Hasan4, Shahadot Hossain5 and Muniruzzaman6 Shanto Mariam University of Creative Technology1, 3 ,Uttara University4,5,6 IJCSNS International Journal of Computer Science and Network 16 Security, VOL.11 No.10, October 2011

[3] SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS 1 SULOCHANA SONKAMBLE, 2DR. RAVINDRA THOOL, 3BALWANT SONKAMBLE 1Asstt Prof., Department of Information Technology , MMCOE, Pune, India 411052 2Professor, Department of Information Technology, SGGSIE&T,Nanded, India -411017 3Asstt Prof., Department of Computer Engineering, PICT, Pune, India-411043

[4] Himanshu Srivastava Department of Computer Science & Engineering Roorkee Institute of Technology, Roorkee (U.K.), India IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 22-29

[5] Ravi Subban and Dattatreya P. Mankame A Study of Biometric Approach Using Fingerprint Recognition Lecture Notes on Software Engineering, Vol. 1, No. 2, May

[6] Mohammed Nasir Uddin1, Selina Sharmin2, Abu Hasnat Shohel Ahmed3 and Emrul Hasan4, Shahadot Hossain5 and Muniruzzaman6 Shanto Mariam University of Creative Technology1, 3 ,Uttara University4,5,6 A Survey of Biometrics Security System IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011

Downloads

Published

2025-11-25

How to Cite

[1]
N. Fathima, B. Pallavi, and K. Kavitha, “Biometrics in Network Security”, Int. J. Comp. Sci. Eng., vol. 7, no. 9, pp. 25–28, Nov. 2025.